US 20070136364 A1
A computer readable medium includes executable instructions to create a first export file that defines attributes and relationships associated with a first business intelligence object. A second export file that characterizes a second business intelligence object associated with the first business intelligence object is formed. The first export file and the second export file are combined into a composite export entity. The composite export entity is distributed.
1. A computer readable medium, comprising executable instructions to:
create a first export file that defines attributes and relationships associated with a first business intelligence object;
form a second export file that characterizes a second business intelligence object associated with the first business intelligence object;
combine the first export file and the second export file into a composite export entity; and
distribute the composite export entity.
2. The computer readable medium of
3. The computer readable medium of
4. The computer readable medium of
5. The computer readable medium of
6. The computer readable medium of
7. The computer readable medium of
8. The computer readable medium of
9. The computer readable medium of
10. A computer readable medium, comprising executable instructions to:
receive a composite export file including a first export file that defines attributes and relationships associated with a first business intelligence object and a second export file that characterizes a second business intelligence object associated with the first business intelligence object;
merge the first business intelligence object and the second business intelligence object into an object hierarchy of a target business intelligence system.
11. The computer readable medium of
12. The computer readable medium of
13. The computer readable medium of
14. A computer readable medium, comprising executable instructions to:
create an export file for a business intelligence object;
characterize inheritance, dependency, and object hierarchy information for the business intelligence object;
identify dependencies associated with the business intelligence object;
identify files associated with the export file;
combine the export file and the files associated with the export file into a composite export object; and
distribute the composite export object.
15. The computer readable medium of
receive the composite export file at a target system;
reconstruct objects associated with the composite export file;
resolve dependencies associated with objects of the composite export file; and
insert the business intelligence object into the appropriate location within the target system.
16. The computer readable medium of
17. The computer readable medium of
18. The computer readable medium of
19. The computer readable medium of
20. The computer readable medium of
This invention relates generally to data storage and retrieval. More particularly, this invention relates to a technique for extracting a business intelligence object from one business intelligence system and deploying the business intelligence object in another business intelligence system.
Business Intelligence (BI) generally refers to software tools used to improve enterprise decision-making, where an enterprise may be a business, government entity, foundation, and the like. These tools are commonly applied to financial, human resource, marketing, sales, customer and supplier analyses. More specifically, these tools can include: reporting and analysis tools to present information; content delivery infrastructure systems for delivery and management of reports and analytics; data warehousing systems for cleansing and consolidating information from disparate sources; and data management systems, such as relational databases or On Line Analytic Processing (OLAP) systems used to collect, store, and manage raw data.
BI systems commonly process BI objects. A BI object is a software object that characterizes resources and data within a BI system. BI objects may include schedules, users, servers, data sources, reports, documents, files (e.g., spread sheets, graphics, data), and the like. A BI object typically contains metadata characterizing itself and/or other entities within a BI system. Metadata is information about information. Metadata typically constitutes a subset or representative values of a larger data set.
A BI object can include a metadata element, a data structure, or a combination of both. An example of a BI object that contains metadata characterizing other entities within a BI system is where a BI object characterizes an associated file. For example, the associated file could be a report—itself a BI object. BI objects include data structures, e.g., an associated file including a report, etc., and metadata elements, e.g., a BI object characterizing a data structure.
Sometimes it is desirable to move a BI object from one system to another, such as when developing content in a test system for deployment in a production system, when providing example BI objects for import to a customer system, when upgrading between two versions of a system, when moving new versions of objects from one system to another, and when backup and versioning of objects. BI object movement can be accomplished by having the source and target system simultaneously online and network accessible by a third system. In this solution, the third system exports objects from the source system, performs any required processing, and imports the objects into the target system. This solution is restrictive since both systems must be running and the import tool must be able to access both systems via a network. In addition, this solution is complicated because one or both systems may be located behind firewalls and/or may be located in physically remote locations and/or different networks. Furthermore, this solution can create a security risk as both systems may be accessible from a network.
Another problem is transporting third-party BI objects. New kinds of BI objects may be created by third-parties and published to a proprietary BI system. Frequently these new objects must be moved to other BI systems, yet the BI system designers have no prior knowledge of the structure of the BI objects. This problem can be resolved by re-writing the import tool to understand every new kind of BI object. This solution is restrictive since it is resource intensive and requires the coordination between import tool developers and all third-party BI object developers. Of course a system can be configured that does not support third-party BI objects. However, this solution restricts the extensibility of a BI system.
In view of the foregoing, it would be desirable to provide an improved technique for moving BI objects from one system to another system.
The invention includes a computer readable medium with executable instructions to create a first export file that defines attributes and relationships associated with a first business intelligence object. A second export file that characterizes a second business intelligence object associated with the first business intelligence object is formed. The first export file and the second export file are combined into a composite export entity. The composite export entity is distributed.
The invention also includes a computer readable medium with executable instructions to receive a composite export file including a first export file that defines attributes and relationships associated with a first business intelligence object and a second export file that characterizes a second business intelligence object associated with the first business intelligence object. The first business intelligence object and the second business intelligence object are merged into an object hierarchy of a target business intelligence system.
The invention is more fully appreciated in connection with the following detailed description taken in conjunction with the accompanying drawings, in which:
Like reference numerals refer to corresponding parts throughout the several views of the drawings.
By way of example, various types of BI objects may be utilized in accordance with the invention, including:
user object—specifying a user
connections object—representing connections to a database
dynamic cascading prompt object—characterizing user prompts in a user interface
glossary term object—representing a glossary term for an encyclopedia application
logon session object—representing information about a user logon session
relationship object—governing how objects relate to each other
report object—representing information about a report
file object—representing information about a file
Each kind of BI object may use a rules file. The rules file defines the structure of the BI object. Thus, the rules file creates a representation of an object and allows for the reconstruction of the object from its representation in the export file. The rules file is meta-metadata, that is information about information on information. In an embodiment where an object is characterized within an XML file. The rules file can be a XML Schema Definition (XSD) file. The use of rules files allows for the importation and exportation of BI objects that were designed independently of the core business enterprise system. The use of rules files allows for more flexible code that can be updated in part by supplying new rules.
Below is an example of a rule file for a metadata element defined as “Name”. In this case the rule (a meta-metadata element) is expressed as XSD for a metadata element stored in XML.
Next, inheritance, dependency and hierarchy information associated with the BI object is characterized 202. The BI object dependencies are identified. This may be implemented using the inheritance, dependency and hierarchy information. Subsequently, the dependent BI object are retrieved 204. Each dependent BI object is parsed for additional dependent BI objects. If additional dependent objects are found, the dependency and hierarchy information associated with these BI objects are characterized.
Some BI objects require the presence of other objects in order to function. These dependencies may not be apparent to the end user who is exporting BI objects. The BI object export module 112 includes executable instructions to automatically identify and export information about objects on which the chosen object has a dependency. The dependencies are reconstructed when the set of objects are imported into the target system. This functionality ensures that the exported object preserves functionality when it is imported to a new system.
In one implementation, the BI object export module 112 includes executable instructions to identify any element in an object that references another object. For example, an object may form part of a dependency tree. In this case, the BI object export module 112 progresses through the dependency tree until all dependent objects are identified. For example, the BI object export module 112 may be configured to assume that elements of the following type are references to dependent objects: local identifiers and global identifiers. In this case, the objects with these identifiers will be exported. Preferably, the BI object export module 112 is programmable to specify an acceptable depth of analysis into a dependency tree. If a dependent object cannot be located within a system, the BI object export module 112 preferably notes an error upon import. Optionally, the BI object export module 112 is programmable to export only those BI objects needed for export. For example, the BI object export module 112 may time stamp a list of objects, but only export those objects that have been updated since the time stamp.
BI objects are organized into hierarchies. Hierarchies are another form of dependency. Hierarchies are important as they impact how the system interacts with the object, including: navigation through the set of objects, how security is applied to the object, how objects interact with and affect the behavior of other objects, and whether the object is displayed in certain user interface pages.
Security may also be considered a form of dependency. A user or user group has a set of rights on a BI object that controls what actions the user can take with that object. Preferably, the BI object export module 112 preserves these security settings when exporting the BI objects such that the reconstructed BI objects are secured in the same way for the same user in the imported system. For example, a file that has been modified will not be imported. A user's security settings are preserved on export and are reapplied on import.
After the BI object dependency operations of block 204 are performed, domain specific identifiers for the BI object may be mapped to global identifiers 206. This operation supports the porting of a BI object developed by a third-party. Domain specific identifiers provide a means for uniquely identifying BI objects. Some types of BI object identifiers provide unique identification within a single business enterprise system, while others provide unique identification globally across all business enterprise systems. The BI object export module 112 performs any required conversions on these identifiers, such that they are guaranteed to be unique where required, but also so the relationships and dependencies between the BI objects are preserved. In particular, domain specific identifiers are mapped to global identifiers. For example, object identifications may be unique within a single cluster, while cluster object identifications are unique across a set of clusters. Because object identifications are not valid in a new system, the BI object export module 112 may convert all object identifications to cluster object identifications. Upon import, the target system converts cluster object identifications to domain specific object identifications.
Next, associated files that are required for the export operation are identified and retrieved 208. Associated files include those files that characterize objects that a BI object relies upon to operate correctly. Thus, these files include files that characterized dependent objects or hierarchical objects that are required for proper operation, as discussed above. That is, previous processing operations identified objects related to a BI object that is to be exported. This operation identifies and/or creates files that characterize the related objects.
A composite export file is created 210. Optionally, the export file and any associated files are compressed. The export file and associated files may be combined into a single file prior to compression. Alternately, the export file and any associated files may be combined into a logical grouping of files after compression. Regardless of the technique used, combined files are referred to as a composite export file. The composite export file may be compressed via a lossless data compression scheme such as run length encoding, e.g., ZIP, LZW, or Huffman encoding. Optionally, the composite export file is encrypted. The export file and the associated files can be encrypted prior to the composite export file's creation, or the composite export file itself can be encrypted.
Finally, the composite export file is distributed 212. The composite export file may be distributed in any number of ways, including the downloading of the export file to the target system, sent by (secure) file transfer protocol, down or up loaded to a web resource, stored on a computer readable medium and physically transported, or the emailing of the export file to the target system. For example, the composite export file may be sent by the BI object export module 112 to the network connection circuit 108 for delivery to a specified network computer.
The object or objects defined by the composite export file are then reconstructed 302. Dependencies between the objects are then resolved 304. Finally, the object or objects are placed in the appropriate hierarchical location or locations within the target system 306, such as shown in
The invention can update objects in the target system as well as create new ones. If the object being imported already exists in the target system, then the BI object import module 114 will not replace the existing object, but will optionally update it based on the contents of the new object. The export file can be used to specify whether an update or over-write will occur or whether the object in the target system will take precedence.
An existing object may be merged with a new object. The merged object will contain all the properties from both the existing and the new object (i.e., no properties will be deleted), but the new object's properties will take precedence over the existing object's properties should any differences exist. For example, consider an existing object with properties “a, b, c”. An object to be imported has properties “a′, x, y” (where a′ is a new version of property a). In this example, the merged object will have the properties a′, b, c, x, and y. This conversion process preserves all business intelligence meaning of the object or set of objects, including security, metadata values, inheritance, relationships, and dependencies.
The contents of the two regions are related. The first region 602 stores a plurality of BI objects. These objects contain the metadata on files stored in the second region 604. The BI objects have associations, dependencies, and hierarchies, e.g., the tree with objects A, B, C and D. The second region 604 stores a plurality of associated files characterized by each BI object in the first region 602. The associated files in the second region 604 are the data for the metadata in the objects in the first region. As shown, the associated files in the second region 604 have no record of their hierarchy, instead they rely on the BI objects in the first region 603. For example, the tree with objects A through D is paired with files A1 through D1, as shown by arrows 652 through 658. In some embodiments, the mapping between objects and files in the two regions is not one to one. For example, object G in region 602 has three files G1 through G3 in region 604, as shown with arrow 664. A file may also have many associated objects.
The types of files stored in the first region 604 include BI application, report, spread sheet, word processing, graphics, text document, data, and comma delimited files. The types of file stored in the second region 604 include application specific files and documents, e.g., BI application files. For example this can include files and documents specific to Business Objects Web Intelligence™, Crystal Reports™, Business Objects OLAP Intelligence™, Business Objects Web Intelligence™, Business Objects Desk Intelligence™, or Business Objects Enterprise™. Another type of file stored in the second region 604 includes program files, e.g., binary encoded computer instructions.
The processing operations of
The composite export file 620 is created by the importing/exporting engine 606. File 620 contains an export file 622 for the characterizing the BI objects for the associated files 624. The associated files in the composite export file 620 are being exported from, or imported to, region 604. The associated files may have their file names changed. For example, a file may be labeled “ID.NNN”, where “ID” is the global identifier for the particular file and “NNN” is the number of the particular file, e.g., for the case where more than one file of a type are exported. A file may have more than one extension. Those skilled in the art will recognize a number of advantages associated with the invention. For example, the invention provides a technique for moving business objects, which does not require multiple systems to be simultaneously operative and communicative. Rather, the export entities of the invention can be created at one point in time and then be utilized at another point in time. If the export entity is already exported, the source entity need not even be operative when the export entity is utilized by the target system. The export entity of the invention easily traverses firewalls and other networked components. In addition, the identifier mapping techniques of the invention support the deployment and porting of third-party objects within a BI system.
An embodiment of the present invention relates to a computer storage product with a computer-readable medium having computer code thereon for performing various computer-implemented operations. The media and computer code may be those specially designed and constructed for the purposes of the present invention, or they may be of the kind well known and available to those having skill in the computer software arts. Examples of computer-readable media include, but are not limited to: magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROMs, DVDs and holographic devices; magneto-optical media; and hardware devices that are specially configured to store and execute program code, such as application-specific integrated circuits (“ASICs”), programmable logic devices (“PLDs”) and ROM and RAM devices. Examples of computer code include machine code, such as produced by a compiler, and files containing higher-level code that are executed by a computer using an interpreter. For example, an embodiment of the invention may be implemented using Java, C++, or other object-oriented programming language and development tools. Another embodiment of the invention may be implemented in hardwired circuitry in place of, or in combination with, machine-executable software instructions.
The foregoing description, for purposes of explanation, used specific nomenclature to provide a thorough understanding of the invention. However, it will be apparent to one skilled in the art that specific details are not required in order to practice the invention. Thus, the foregoing descriptions of specific embodiments of the invention are presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed; obviously, many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the invention and its practical applications, they thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the following claims and their equivalents define the scope of the invention.